SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
From Bitcoin Hardware Wallets
to Personal Security Devices
Inside Bitcoins Seoul 2015
Nicolas Bacca, CTO, Ledger
Secure Element solutions architect
Whitehat security reports
https://github.com/btchip/trezor-security-exploits
http://fr.slideshare.net/EricLarcheveque/bitcoin-
hardware-wallets-security
About me
LEDGER
Key protection
Malware, (side channels, covert channels)
Independant devices
Static validation only
Check destination, amount
Hardware Wallets today
Confirming a transaction is
complicated
Common use case : web purchase is
not covered
BIP 70 helps, but is not supported by Hardware
Wallets yet
BIP 70 is merchant centric
PKI issues again - how to validate certificates,
how to revoke certificates on a disconnected
User Experience limitations
LEDGER
Colored Coins with multiple kernels
Open Assets popular right now
Blockchain proofs
Augur, Bitproof ...
More Smart Contracts in the future
New protocol layers
Sidechains, Hubs
Growing, dynamic use cases
for Blockchain applications
LEDGER
Arbitrary signature
Mails, contracts, GnuPG, ...
Arbitrary encryption (export warning …)
Mails, messages, GnuPG, …
Identity
FIDO, SSH, ...
Other generic use cases
LEDGER
User Experience should be
customizable
One size doesn’t fit all
Valuable assets go way beyond the
transaction amount.
Moving targets for
Blockchain applications
LEDGER
More complicated to revoke
Can not just send the coins to another address
Open plug-ins complexity
Additional leak risks if not properly isolated
Growing security concerns
LEDGER
Dynamic applications
Isolation of critical components
Performance (size and speed)
Technical issues
LEDGER
Provisioning strategy
Signed by the device / App Store
Storage
Internal or External
General purpose APIs
First software isolation layer
Dynamic applications
LEDGER
User enrolls the device locally
User signs the generic application
Optionally recompiles / checks it
User installs the signed application
Now specifically trusted for this device
Provisioning strategy (self)
LEDGER
User enrolls the device into App Store
App Store encrypts the application
App Store personalizes the application
Can be device specific, encrypted
Provisioning strategy (app store
with secret in apps)
LEDGER
User enrolls the device into App Store
App Store signs the application
App Store personalizes the application
Can be device specific, encrypted
Provisioning strategy (app store
with common apps, enrollment)
LEDGER
User downloads a signed application
Provisioning strategy (app store
with common apps, no
personalization)
LEDGER
Different models
Easier if no secrets in apps, no personalization
Can be mixed
App Store and specific user trusted applications
Provisioning strategy
LEDGER
Requires a fine flash management API
Sectors are too big for some MCUs
Filesystem issues
Reorganizations, wear leveling and anti tearing
Helps for a standalone device
Also for collaboration between applications
Internal storage
LEDGER
Requires “large” available RAM space
Or a mixed storage strategy, not efficient
Not standalone
Need to always have the application around
Replay issues if everything is external
On board application state storage is easier
External storage
LEDGER
Internal Storage easier when possible
Pick the right MCU or use Secure Elements
Otherwise compromises to be made
Application state storage & overall usability
Storage
LEDGER
Isolation of the cryptographic materials
Most important thing to do whatever the use
Different use cases
Wallet plugin or full application oriented
General Purpose APIs
LEDGER
Signature APIs to be validated
Might control but not sign blindly
Handle new outputs, TX formats
For example Payment Protocol or colors
Provide additional TX information
On screen display or confirmation logic
Wallet plugin APIs
LEDGER
API provide basic building blocks
Crypto, I/O
Everything else implemented using it
Full wallet and extensions
Isolation is critical
Typically prevent raw flash reads
Full application oriented API
LEDGER
Way more complex than full isolation
Isolation, with some firewalling logic
Specific implementation can help
Virtual machine easier than bare metal
Also concurrent execution to consider
Way easier if not supporting it
Inter application communication
LEDGER
Architecture to be chosen
“Full” is more flexible, if doable on the platform
Isolation is the most critical asset
Proper crypto APIs is the second one
Key protection, side channel resistant
General Purpose APIs
LEDGER
High level virtual machine
Used in high level languages
Low level virtual machine
CPU emulation, target standard C code
Hardware assisted
Can also help in VM development
Isolation strategies
LEDGER
How easy is it to audit
Carefully audit optimizations (native translation)
Sandbox escaping : type confusion
Raw pointer access risk, invalid bytecode
Sandbox escaping : native interface
Audit argument checks
Security of a High level virtual
machine
LEDGER
Well audited security model
Earliest Virtual Machine around
Flexible performance
Different versions, see also Java Card
Complicated licensing
Free/OSS embedded implementations at risk
High level Virtual Machine : Java
LEDGER
Simple security model
Easy to audit (bytecode similar to Java)
Predictable performance
No optimization in the default version
Licensing to be validated
Apache, but some IP claims in the past
High level Virtual Machine : Dalvik
LEDGER
Security model to be validated
Different complex types, lists
Flexible performance
No optimization or machine translation
Open Source licensing
MIT
High level Virtual Machine :
microPython
LEDGER
Security model to be validated
Different complex types
Predictable performance
No optimization
Open Source licensing
MIT
High level Virtual Machine :
embedded Lua
LEDGER
How easy is it to audit
Carefully audit optimizations (native translation)
Sandbox escaping : native interface
Audit argument checks
Security of a Low level virtual
machine
LEDGER
Very simple architecture
No risks
Predictable performance
No optimization
Open Source licensing
MIT
Low level Virtual Machine : moxie
LEDGER
Memory Protection Unit
Isolate memory areas (flash / RAM)
Supervisor mode
Lock the MPU
MPU + SU enable “trap” service calls
Isolate the core APIs and the applications
Hardware assisted isolation
LEDGER
Optional for ARM M3 MCUs
Found in some MCU, not entry level
Common for ARM Secure Elements
SC000 / SC300
Hardware assisted isolation support
LEDGER
Native isolation when supported
C code with native performance
Moxie VM when not supported
Source code portability
Optional lightweight Dalvik on top
For Java (Card) developers
Ledger implementation
LEDGER
Java Card playground for the high level API
https://github.com/ledgerhq/ledger-javacard (soon)
Trusted Execution Environment public beta,
high level isolation prototype
Open Source isolation product coming up Jan
2016 for developers (Ledger Blue : USB, BLE,
NFC, screen)
Follow up with Ledger
LEDGER
@LedgerHQ
Thank you
Inside Bitcoins Seoul 2015

Contenu connexe

Tendances

Java Card Platform Security and Performance
Java Card Platform Security and PerformanceJava Card Platform Security and Performance
Java Card Platform Security and PerformanceEric Vétillard
 
Technical Overview of Java Card
Technical Overview of Java CardTechnical Overview of Java Card
Technical Overview of Java CardAnshuman Sinha
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyCryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyEric Larcheveque
 
JavaCard development Quickstart
JavaCard development QuickstartJavaCard development Quickstart
JavaCard development QuickstartMartin Paljak
 
jCardSim - development platform for Java Card Applications
jCardSim - development platform for Java Card ApplicationsjCardSim - development platform for Java Card Applications
jCardSim - development platform for Java Card ApplicationsMikhail Dudarev
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java CardJulien SIMON
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere générationSylvain Maret
 
15 sensors and proximity nfc and bluetooth
15   sensors and proximity nfc and bluetooth15   sensors and proximity nfc and bluetooth
15 sensors and proximity nfc and bluetoothWindowsPhoneRocks
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedArash Ramez
 
Bitcoin hardware wallets security
Bitcoin hardware wallets securityBitcoin hardware wallets security
Bitcoin hardware wallets securityEric Larcheveque
 

Tendances (18)

Java Card Platform Security and Performance
Java Card Platform Security and PerformanceJava Card Platform Security and Performance
Java Card Platform Security and Performance
 
Technical Overview of Java Card
Technical Overview of Java CardTechnical Overview of Java Card
Technical Overview of Java Card
 
Javacardtech
JavacardtechJavacardtech
Javacardtech
 
Javacard
Javacard Javacard
Javacard
 
Java card
Java cardJava card
Java card
 
iXGuard
iXGuardiXGuard
iXGuard
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin AssemblyCryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
Cryptocurrencies Hardware Wallets - 33C3 Bitcoin Assembly
 
Demystifying Apple 'Pie' & TouchID
Demystifying Apple 'Pie' & TouchIDDemystifying Apple 'Pie' & TouchID
Demystifying Apple 'Pie' & TouchID
 
JavaCard development Quickstart
JavaCard development QuickstartJavaCard development Quickstart
JavaCard development Quickstart
 
jCardSim - development platform for Java Card Applications
jCardSim - development platform for Java Card ApplicationsjCardSim - development platform for Java Card Applications
jCardSim - development platform for Java Card Applications
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java Card
 
Java card
Java card Java card
Java card
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
 
15 sensors and proximity nfc and bluetooth
15   sensors and proximity nfc and bluetooth15   sensors and proximity nfc and bluetooth
15 sensors and proximity nfc and bluetooth
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
Java card
Java cardJava card
Java card
 
Bitcoin hardware wallets security
Bitcoin hardware wallets securityBitcoin hardware wallets security
Bitcoin hardware wallets security
 

En vedette

Cloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingCloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingMecklerMedia
 
A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)MecklerMedia
 
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)FrancisPouliot
 
Bitcoin and Blockchain for noobs
Bitcoin and Blockchain for noobsBitcoin and Blockchain for noobs
Bitcoin and Blockchain for noobsMonik Pamecha
 
2015 - Crypto 2.0 trends and projection
2015 - Crypto 2.0 trends and projection2015 - Crypto 2.0 trends and projection
2015 - Crypto 2.0 trends and projectionTom Ding
 
Intro to Crypto Economic dApp
Intro to Crypto Economic dAppIntro to Crypto Economic dApp
Intro to Crypto Economic dAppTom Ding
 
Finance: An Autonomous future
Finance: An Autonomous futureFinance: An Autonomous future
Finance: An Autonomous futureTom Ding
 
Coinomia Elaborated Compensation Plan
Coinomia Elaborated Compensation PlanCoinomia Elaborated Compensation Plan
Coinomia Elaborated Compensation PlanCoinomia
 
Tales from the crypto early stories of bitcoin and cryptocurrency inspired art
Tales from the crypto  early stories of bitcoin and cryptocurrency inspired artTales from the crypto  early stories of bitcoin and cryptocurrency inspired art
Tales from the crypto early stories of bitcoin and cryptocurrency inspired artMecklerMedia
 
YOCoin Philippines Compensation Plan
YOCoin Philippines Compensation PlanYOCoin Philippines Compensation Plan
YOCoin Philippines Compensation PlanYOCoin Philippines
 
Why bitcoin will change everything
Why bitcoin will change everythingWhy bitcoin will change everything
Why bitcoin will change everythingTom Ding
 
151021 metamason 10 page competition pitch
151021   metamason 10 page competition pitch151021   metamason 10 page competition pitch
151021 metamason 10 page competition pitchMecklerMedia
 
Buy and Sell By paymium
Buy and Sell By paymiumBuy and Sell By paymium
Buy and Sell By paymiumLaFrenchMobile
 
Pdf guerrilla marketing
Pdf guerrilla marketingPdf guerrilla marketing
Pdf guerrilla marketingMecklerMedia
 
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
Inside 3 d printing   metamoderism, leslie oliver karpas (save small)Inside 3 d printing   metamoderism, leslie oliver karpas (save small)
Inside 3 d printing metamoderism, leslie oliver karpas (save small)MecklerMedia
 
Bitcoin Payment Focus
Bitcoin Payment Focus Bitcoin Payment Focus
Bitcoin Payment Focus MecklerMedia
 
Steve beauregard keynote
Steve beauregard keynoteSteve beauregard keynote
Steve beauregard keynoteMecklerMedia
 

En vedette (20)

Cloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingCloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printing
 
A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)
 
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
 
Bitcoin for Noobs
Bitcoin for NoobsBitcoin for Noobs
Bitcoin for Noobs
 
Bitcoin and Blockchain for noobs
Bitcoin and Blockchain for noobsBitcoin and Blockchain for noobs
Bitcoin and Blockchain for noobs
 
2015 - Crypto 2.0 trends and projection
2015 - Crypto 2.0 trends and projection2015 - Crypto 2.0 trends and projection
2015 - Crypto 2.0 trends and projection
 
Intro to Crypto Economic dApp
Intro to Crypto Economic dAppIntro to Crypto Economic dApp
Intro to Crypto Economic dApp
 
BitCoin Protocol
BitCoin ProtocolBitCoin Protocol
BitCoin Protocol
 
Finance: An Autonomous future
Finance: An Autonomous futureFinance: An Autonomous future
Finance: An Autonomous future
 
Coinomia Elaborated Compensation Plan
Coinomia Elaborated Compensation PlanCoinomia Elaborated Compensation Plan
Coinomia Elaborated Compensation Plan
 
Tales from the crypto early stories of bitcoin and cryptocurrency inspired art
Tales from the crypto  early stories of bitcoin and cryptocurrency inspired artTales from the crypto  early stories of bitcoin and cryptocurrency inspired art
Tales from the crypto early stories of bitcoin and cryptocurrency inspired art
 
bitcoin_presentation
bitcoin_presentationbitcoin_presentation
bitcoin_presentation
 
YOCoin Philippines Compensation Plan
YOCoin Philippines Compensation PlanYOCoin Philippines Compensation Plan
YOCoin Philippines Compensation Plan
 
Why bitcoin will change everything
Why bitcoin will change everythingWhy bitcoin will change everything
Why bitcoin will change everything
 
151021 metamason 10 page competition pitch
151021   metamason 10 page competition pitch151021   metamason 10 page competition pitch
151021 metamason 10 page competition pitch
 
Buy and Sell By paymium
Buy and Sell By paymiumBuy and Sell By paymium
Buy and Sell By paymium
 
Pdf guerrilla marketing
Pdf guerrilla marketingPdf guerrilla marketing
Pdf guerrilla marketing
 
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
Inside 3 d printing   metamoderism, leslie oliver karpas (save small)Inside 3 d printing   metamoderism, leslie oliver karpas (save small)
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
 
Bitcoin Payment Focus
Bitcoin Payment Focus Bitcoin Payment Focus
Bitcoin Payment Focus
 
Steve beauregard keynote
Steve beauregard keynoteSteve beauregard keynote
Steve beauregard keynote
 

Similaire à From Bitcoin Hardware Wallets to Personal Privacy Devices

Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great againEric Larcheveque
 
Future of hardware wallets bip 001
Future of hardware wallets   bip 001Future of hardware wallets   bip 001
Future of hardware wallets bip 001Eric Larcheveque
 
How to Use OWASP Security Logging
How to Use OWASP Security LoggingHow to Use OWASP Security Logging
How to Use OWASP Security LoggingMilton Smith
 
Open source iam value, benefits, and risks
Open source iam  value, benefits, and risksOpen source iam  value, benefits, and risks
Open source iam value, benefits, and risksWSO2
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)Amazon Web Services
 
Fullstack IoT Development
Fullstack IoT DevelopmentFullstack IoT Development
Fullstack IoT DevelopmentAndri Yadi
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
 
Defcon 18 "Hacking Electronic Door Access Controllers"
Defcon 18  "Hacking Electronic Door Access Controllers" Defcon 18  "Hacking Electronic Door Access Controllers"
Defcon 18 "Hacking Electronic Door Access Controllers" shawn_merdinger
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsAll Things Open
 
A Taste of Java ME
A Taste of Java MEA Taste of Java ME
A Taste of Java MEwiradikusuma
 
Scada Strangelove - 29c3
Scada Strangelove - 29c3Scada Strangelove - 29c3
Scada Strangelove - 29c3qqlan
 
Java Card Security
Java Card SecurityJava Card Security
Java Card SecurityRiscure
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationSylvain Maret
 

Similaire à From Bitcoin Hardware Wallets to Personal Privacy Devices (20)

Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
 
Future of hardware wallets bip 001
Future of hardware wallets   bip 001Future of hardware wallets   bip 001
Future of hardware wallets bip 001
 
Rebooting the smartcard
Rebooting the smartcardRebooting the smartcard
Rebooting the smartcard
 
How to Use OWASP Security Logging
How to Use OWASP Security LoggingHow to Use OWASP Security Logging
How to Use OWASP Security Logging
 
Open source iam value, benefits, and risks
Open source iam  value, benefits, and risksOpen source iam  value, benefits, and risks
Open source iam value, benefits, and risks
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
 
Fullstack IoT Development
Fullstack IoT DevelopmentFullstack IoT Development
Fullstack IoT Development
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Defcon 18 "Hacking Electronic Door Access Controllers"
Defcon 18  "Hacking Electronic Door Access Controllers" Defcon 18  "Hacking Electronic Door Access Controllers"
Defcon 18 "Hacking Electronic Door Access Controllers"
 
Cryptocurrencies
CryptocurrenciesCryptocurrencies
Cryptocurrencies
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
IoT on azure
IoT on azureIoT on azure
IoT on azure
 
A Taste of Java ME
A Taste of Java MEA Taste of Java ME
A Taste of Java ME
 
Scada Strangelove - 29c3
Scada Strangelove - 29c3Scada Strangelove - 29c3
Scada Strangelove - 29c3
 
Java Card Security
Java Card SecurityJava Card Security
Java Card Security
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 

Plus de MecklerMedia

Solving problems with authentication
Solving problems with authenticationSolving problems with authentication
Solving problems with authenticationMecklerMedia
 
Global Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookGlobal Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookMecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldMecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldMecklerMedia
 
Why Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseWhy Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseMecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldMecklerMedia
 
Building a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoBuilding a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoMecklerMedia
 
Bitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondBitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondMecklerMedia
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleMecklerMedia
 
Bitcoin Past Present Future
Bitcoin Past Present FutureBitcoin Past Present Future
Bitcoin Past Present FutureMecklerMedia
 
Inside 3 d printing 2015
Inside 3 d printing 2015Inside 3 d printing 2015
Inside 3 d printing 2015MecklerMedia
 
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...MecklerMedia
 
Designing for the dmls process oct2015
Designing for the dmls process oct2015Designing for the dmls process oct2015
Designing for the dmls process oct2015MecklerMedia
 
Inside 3 d printing presentation lisa
Inside 3 d printing presentation lisaInside 3 d printing presentation lisa
Inside 3 d printing presentation lisaMecklerMedia
 
Inside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamInside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamMecklerMedia
 
Efesto presentation kunal varma
Efesto presentation  kunal varmaEfesto presentation  kunal varma
Efesto presentation kunal varmaMecklerMedia
 
Infra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideInfra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideMecklerMedia
 
V rin construction-7
V rin construction-7V rin construction-7
V rin construction-7MecklerMedia
 
I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2MecklerMedia
 

Plus de MecklerMedia (20)

Solving problems with authentication
Solving problems with authenticationSolving problems with authentication
Solving problems with authentication
 
Global Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookGlobal Capital Markets & Industry Outlook
Global Capital Markets & Industry Outlook
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Why Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseWhy Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to Increase
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Building a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoBuilding a Robotics Hub in San Diego
Building a Robotics Hub in San Diego
 
The Cognitive Era
The Cognitive EraThe Cognitive Era
The Cognitive Era
 
Bitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondBitcoin, Blockchain & Beyond
Bitcoin, Blockchain & Beyond
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical People
 
Bitcoin Past Present Future
Bitcoin Past Present FutureBitcoin Past Present Future
Bitcoin Past Present Future
 
Inside 3 d printing 2015
Inside 3 d printing 2015Inside 3 d printing 2015
Inside 3 d printing 2015
 
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
 
Designing for the dmls process oct2015
Designing for the dmls process oct2015Designing for the dmls process oct2015
Designing for the dmls process oct2015
 
Inside 3 d printing presentation lisa
Inside 3 d printing presentation lisaInside 3 d printing presentation lisa
Inside 3 d printing presentation lisa
 
Inside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamInside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranpham
 
Efesto presentation kunal varma
Efesto presentation  kunal varmaEfesto presentation  kunal varma
Efesto presentation kunal varma
 
Infra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideInfra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslide
 
V rin construction-7
V rin construction-7V rin construction-7
V rin construction-7
 
I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2
 

Dernier

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 

Dernier (20)

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 

From Bitcoin Hardware Wallets to Personal Privacy Devices

  • 1. From Bitcoin Hardware Wallets to Personal Security Devices Inside Bitcoins Seoul 2015
  • 2. Nicolas Bacca, CTO, Ledger Secure Element solutions architect Whitehat security reports https://github.com/btchip/trezor-security-exploits http://fr.slideshare.net/EricLarcheveque/bitcoin- hardware-wallets-security About me LEDGER
  • 3. Key protection Malware, (side channels, covert channels) Independant devices Static validation only Check destination, amount Hardware Wallets today
  • 4. Confirming a transaction is complicated Common use case : web purchase is not covered BIP 70 helps, but is not supported by Hardware Wallets yet BIP 70 is merchant centric PKI issues again - how to validate certificates, how to revoke certificates on a disconnected User Experience limitations LEDGER
  • 5. Colored Coins with multiple kernels Open Assets popular right now Blockchain proofs Augur, Bitproof ... More Smart Contracts in the future New protocol layers Sidechains, Hubs Growing, dynamic use cases for Blockchain applications LEDGER
  • 6. Arbitrary signature Mails, contracts, GnuPG, ... Arbitrary encryption (export warning …) Mails, messages, GnuPG, … Identity FIDO, SSH, ... Other generic use cases LEDGER
  • 7. User Experience should be customizable One size doesn’t fit all Valuable assets go way beyond the transaction amount. Moving targets for Blockchain applications LEDGER
  • 8. More complicated to revoke Can not just send the coins to another address Open plug-ins complexity Additional leak risks if not properly isolated Growing security concerns LEDGER
  • 9. Dynamic applications Isolation of critical components Performance (size and speed) Technical issues LEDGER
  • 10. Provisioning strategy Signed by the device / App Store Storage Internal or External General purpose APIs First software isolation layer Dynamic applications LEDGER
  • 11. User enrolls the device locally User signs the generic application Optionally recompiles / checks it User installs the signed application Now specifically trusted for this device Provisioning strategy (self) LEDGER
  • 12. User enrolls the device into App Store App Store encrypts the application App Store personalizes the application Can be device specific, encrypted Provisioning strategy (app store with secret in apps) LEDGER
  • 13. User enrolls the device into App Store App Store signs the application App Store personalizes the application Can be device specific, encrypted Provisioning strategy (app store with common apps, enrollment) LEDGER
  • 14. User downloads a signed application Provisioning strategy (app store with common apps, no personalization) LEDGER
  • 15. Different models Easier if no secrets in apps, no personalization Can be mixed App Store and specific user trusted applications Provisioning strategy LEDGER
  • 16. Requires a fine flash management API Sectors are too big for some MCUs Filesystem issues Reorganizations, wear leveling and anti tearing Helps for a standalone device Also for collaboration between applications Internal storage LEDGER
  • 17. Requires “large” available RAM space Or a mixed storage strategy, not efficient Not standalone Need to always have the application around Replay issues if everything is external On board application state storage is easier External storage LEDGER
  • 18. Internal Storage easier when possible Pick the right MCU or use Secure Elements Otherwise compromises to be made Application state storage & overall usability Storage LEDGER
  • 19. Isolation of the cryptographic materials Most important thing to do whatever the use Different use cases Wallet plugin or full application oriented General Purpose APIs LEDGER
  • 20. Signature APIs to be validated Might control but not sign blindly Handle new outputs, TX formats For example Payment Protocol or colors Provide additional TX information On screen display or confirmation logic Wallet plugin APIs LEDGER
  • 21. API provide basic building blocks Crypto, I/O Everything else implemented using it Full wallet and extensions Isolation is critical Typically prevent raw flash reads Full application oriented API LEDGER
  • 22. Way more complex than full isolation Isolation, with some firewalling logic Specific implementation can help Virtual machine easier than bare metal Also concurrent execution to consider Way easier if not supporting it Inter application communication LEDGER
  • 23. Architecture to be chosen “Full” is more flexible, if doable on the platform Isolation is the most critical asset Proper crypto APIs is the second one Key protection, side channel resistant General Purpose APIs LEDGER
  • 24. High level virtual machine Used in high level languages Low level virtual machine CPU emulation, target standard C code Hardware assisted Can also help in VM development Isolation strategies LEDGER
  • 25. How easy is it to audit Carefully audit optimizations (native translation) Sandbox escaping : type confusion Raw pointer access risk, invalid bytecode Sandbox escaping : native interface Audit argument checks Security of a High level virtual machine LEDGER
  • 26. Well audited security model Earliest Virtual Machine around Flexible performance Different versions, see also Java Card Complicated licensing Free/OSS embedded implementations at risk High level Virtual Machine : Java LEDGER
  • 27. Simple security model Easy to audit (bytecode similar to Java) Predictable performance No optimization in the default version Licensing to be validated Apache, but some IP claims in the past High level Virtual Machine : Dalvik LEDGER
  • 28. Security model to be validated Different complex types, lists Flexible performance No optimization or machine translation Open Source licensing MIT High level Virtual Machine : microPython LEDGER
  • 29. Security model to be validated Different complex types Predictable performance No optimization Open Source licensing MIT High level Virtual Machine : embedded Lua LEDGER
  • 30. How easy is it to audit Carefully audit optimizations (native translation) Sandbox escaping : native interface Audit argument checks Security of a Low level virtual machine LEDGER
  • 31. Very simple architecture No risks Predictable performance No optimization Open Source licensing MIT Low level Virtual Machine : moxie LEDGER
  • 32. Memory Protection Unit Isolate memory areas (flash / RAM) Supervisor mode Lock the MPU MPU + SU enable “trap” service calls Isolate the core APIs and the applications Hardware assisted isolation LEDGER
  • 33. Optional for ARM M3 MCUs Found in some MCU, not entry level Common for ARM Secure Elements SC000 / SC300 Hardware assisted isolation support LEDGER
  • 34. Native isolation when supported C code with native performance Moxie VM when not supported Source code portability Optional lightweight Dalvik on top For Java (Card) developers Ledger implementation LEDGER
  • 35. Java Card playground for the high level API https://github.com/ledgerhq/ledger-javacard (soon) Trusted Execution Environment public beta, high level isolation prototype Open Source isolation product coming up Jan 2016 for developers (Ledger Blue : USB, BLE, NFC, screen) Follow up with Ledger LEDGER @LedgerHQ